23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Red Team Exercise – An exercise, reflecting real-world conditions, that is conducted as a<br />

simulated adversarial attempt to compromise organizational missions<br />

and/or business processes to provide a comprehensive assessment <strong>of</strong><br />

the security capability <strong>of</strong> the information system and organization.<br />

SOURCE: SP 800-53<br />

Red/Black Concept – Separation <strong>of</strong> electrical and electronic circuits, components,<br />

equipment, and systems that handle unencrypted information (Red),<br />

in electrical form, from those that handle encrypted information<br />

(Black) in the same form.<br />

SOURCE: CNSSI-4009<br />

Reference Monitor – The security engineering term for IT functionality that—<br />

1) controls all access,<br />

2) cannot be bypassed,<br />

3) is tamper-resistant, and<br />

4) provides confidence that the other three items are true.<br />

SOURCE: SP 800-33<br />

Concept <strong>of</strong> an abstract machine that enforces Target <strong>of</strong> Evaluation<br />

(TOE) access control policies.<br />

SOURCE: CNSSI-4009<br />

Registration – The process through which a party applies to become a subscriber <strong>of</strong><br />

a Credentials Service Provider (CSP) and a Registration Authority<br />

validates the identity <strong>of</strong> that party on behalf <strong>of</strong> the CSP.<br />

SOURCE: SP 800-63; CNSSI-4009<br />

Registration Authority (RA) –<br />

Registration Authority –<br />

(RA)<br />

A trusted entity that establishes and vouches for the identity <strong>of</strong> a<br />

subscriber to a CSP. The RA may be an integral part <strong>of</strong> a CSP, or it<br />

may be independent <strong>of</strong> a CSP, but it has a relationship to the CSP(s).<br />

SOURCE: SP 800-63; CNSSI-4009<br />

Organization responsible for assignment <strong>of</strong> unique identifiers to<br />

registered objects.<br />

SOURCE: FIPS 188<br />

Rekey – To change the value <strong>of</strong> a cryptographic key that is being used in a<br />

cryptographic system/application.<br />

SOURCE: CNSSI-4009<br />

Rekey (a certificate) – To change the value <strong>of</strong> a cryptographic key that is being used in a<br />

cryptographic system application; this normally entails issuing a new<br />

certificate on the new public key.<br />

SOURCE: SP 800-32<br />

Pg 153

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!